-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Open Wireless Access
Our Senior Administration has asked why we don't provide "open" wifi access to visitors, people walking through campus, etc. etc. I've got a host of reasons, but thought I'd inquire as to whether any other schools (especially State/Public schools) provide
OPEN WIFI ACCESS. In short ... I've been asked "Why can't we be like Starbucks?" :-(
I'd really appreciate any feedback. Does your school provide open wifi for guests? We have a process for legitimate guests to get guest accounts and wifi very expediently, but apparently that doesn't go far enough. I'm concerned about implications of
CALEA, risks to University reputation if we have individuals sitting in their car or on a park bench on campus accessing our wifi and doing strange/bad things, etc.
THANKS
THANKS
Carmen A. Rahm
Asst. VP for Info. Technology
Central Washington University
400 East University Way
Ellensburg, WA 98926
Direct Phone: (509) 963-2925
Mobile Phone: (360) 271-2992
ITS Office Phone: (509) 963-2333
ITS Homepage: www.cwu.edu/~its
Asst. VP for Info. Technology
Central Washington University
400 East University Way
Ellensburg, WA 98926
Direct Phone: (509) 963-2925
Mobile Phone: (360) 271-2992
ITS Office Phone: (509) 963-2333
ITS Homepage: www.cwu.edu/~its
GO GREEN! This email uses 100% recycled electrons.
No electrons were harmed while composing this message.
********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
No electrons were harmed while composing this message.

















Comments
We were open but have moved to authenticated access. We have guest access accounts but people still have to log in. At Starbucks, you are paying for the access as part of the price of the coffee… it is not “free.”
Dr. Robert Paterson
Vice President, Information Technology, Planning & Research
Molloy College
Rockville Centre, NY 11571
516-678-5000 ex 6443
______________________________________
Joseph Moreau
Chief Technology Officer
State University of New York at Oswego
509 Culkin Hall
7060 State Route 104
Oswego, NY 13126
joseph.moreau@oswego.edu
315-312-5500 office
315-806-2166 mobile
315-312-5799 fax
______________________________________
THANKS
Asst. VP for Info. Technology
Central Washington University
400 East University Way
Ellensburg, WA 98926
Direct Phone: (509) 963-2925
Mobile Phone: (360) 271-2992
ITS Office Phone: (509) 963-2333
ITS Homepage: www.cwu.edu/~its
No electrons were harmed while composing this message.
David
_____________________________________________________________________
David W. Sisk Associate Director for Administration, Information Technology Services
Macalester College / 1600 Grand Avenue / Saint Paul, Minnesota 55105-1899
http://www.macalester.edu/~sisk/ Voice (651) 696-6745, FAX (651) 696-6778
So we ARE like Starbucks. Buy a course, get free wireless …
At Seton Hall University we do the same as Molloy; users’ have to log in using their network credential to get wireless access, but we provide guest accounts for library patrons, temp SSID’s/passwords for conferences, and the like.
I’d be interested in whether campuses that do provide open wireless still come under the “private network” exception to CALEA compliance.
Cheers,
Steve
Reply-To: The EDUCAUSE CIO Constituent Group Listserv <CIO@LISTSERV.EDUCAUSE.EDU>
Date: Thu, 10 Nov 2011 10:05:04 -0800
To: <CIO@LISTSERV.EDUCAUSE.EDU>
Subject: [CIO] Open Wireless Access
THANKS
Asst. VP for Info. Technology
Central Washington University
400 East University Way
Ellensburg, WA 98926
Direct Phone: (509) 963-2925
Mobile Phone: (360) 271-2992
ITS Office Phone: (509) 963-2333
ITS Homepage: www.cwu.edu/~its
No electrons were harmed while composing this message.
We have an open wifi / visitor based network. Gets them internet and no more. Handy for visitors and conferences…parents etc. Anymore some form of visitor based network is simply expected…
Brian
Creighton University
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of David Sisk
Sent: Thursday, November 10, 2011 12:22 PM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Open Wireless Access
We provide access to the Internet - and nothing else - to guests via wireless, no password required, for up to 12 hours. It's useful for visiting speakers, prospective students, etc. so that they can get to the Web and their Web-based email.
David
_____________________________________________________________________
David W. Sisk Associate Director for Administration, Information Technology Services
Macalester College / 1600 Grand Avenue / Saint Paul, Minnesota 55105-1899
http://www.macalester.edu/~sisk/ Voice (651) 696-6745, FAX (651) 696-6778
Here at Roane State we have a “guest” access on our wireless network which restricts visitors to the Internet only. We then provide a less restrictive access to active employees and registered students who use their own devices and finally we have an open access to Roane State owned devices we register on the wireless network that allow users to work as if they were at their desktop.
Regards,
Tim
Tim Carroll
Assistant Vice President, Information Technology
Roane State Community College
We provide 3 (soon to be 2) SSIDs for wireless access.
We have a “guest” SSID that is restricted to basically only allow HTTP traffic. This is open to anyone. It’s been available on campus now for over a year and has made our lives much simpler when hosting events, etc.
We also have an unencrypted, NAC controlled (Bradford Campus Manager) SSID and a WPA2 SSID. We intend to remove the unencrypted SSID sometime next year leaving only encrypted wireless access and guest. We’ll probably use .1X for authentication on the WPA2 wireless as we’re planning to move away from our NAC system.
We just rolled out EDUROAM ( http://EDUROAM.org/ ) and that supports 802.1x and we are planning to use that for people on campus so we get auto-login of devices and WPA2 support for security. I use this on my iphone and ipad and it works great. In addition, this allows colleagues from other institutions on EDUROAM to auto login to the wireless using their own institutional credentials.
Jack Suess
Regulatory in that we don't know how we would comply with DMCA violations.
Cost because we can keep adding wireless access points and backplane network capacity to handle the number of people who'd come through the campus.
Note we are in an urban setting.
There are short term and long term visitor provisions.
Short term for conference meetings is coordinated by the event manager is specific locations, like our historic house used for meetings or our campus student union meeting space.
Visitors to the library can present identification and get short term access (something like 24-48 hours).
Longer term visitors, like guest researches, can get a guest account once identity is proved and the department authorizes the sponsorship.
Theresa
I would normally go off on my standard network security rant using child porn as an example and citing things like the “20 Critical Security Controls” at this point. I would also point out what I think is our obligation to not be gaping security holes used by people as launching points for attacks against others.
Instead, I’ll ask a different question. Wireless networking costs money for hardware, software, support staff, internet bandwidth, etc. Every guest user in your RF space is taking bandwidth away from every other user in the area so they are reducing the potential performance of your wireless network. When their stuff doesn’t work right they take valuable staff time away from “paying customers” when they ask for help. If they do something illegal then I’m stuck with damage to the college’s reputation as well as cleaning up the mess, dealing with law enforcement, etc. Why would we give this away to just anyone who happens to be within range of our access points? I’ve been trying to think of an example of anything else of similar cost that we give away here on our campus. To me it’s like leaving almost all of the doors on campus unlocked 24x7 and not caring who wanders into our buildings or what they do while they are here. We don’t do that with physical security so why do it with network security?
I’m just not seeing the logic of doing open, unauthenticated guest network access of any kind. I know it is easier to just do it that way than deal with people yelling at us because it takes two or five minutes to show some ID and get a guest account. I’ve been yelled at more than once. I would bet that in most, if not all, cases where an open system was put in place it was because of layer 8 and 9 pressure to make things “easy” for users. If that’s not the case, I’d be fascinated to hear the logic used.
The information security triad is Confidentiality, Integrity and Availability. I don’t think availability should trump in this case. The network you save may be your own. Oops, I think I just did a security rant.
--
Ron Parker, Director of Information Technology, Brazosport College
Voice: (979) 230-3480 FAX: (979) 230-3111
http://www.brazosport.edu
This e-mail sent from my non-mobile, 64-bit, quad core, Windows 7 workstation.
Eric
And the reply.
I will quit spamming you now.
From: Jack Suess [jack@UMBC.EDU]
Sent: 11/10/2011 05:21 PM EST
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Open Wireless Access
Ron,
Carmen,
Hood College is not a state/publicly funded institution. We started an open “guest” SSID this semester with limited bandwidth / port 80 only. Our stats show a high rate of usage (20-25%) despite the availability of higher speed connections. I suspect that some of our neighbors are joining us, but the expectation of Starbucks-like availability has triggered this experiment. Unfortunately, I do not know if we will be able to put Pandora back in her box.
Neil Fay, CTO, Hood College
Theresa
However, it seems that the whole CALEA law is being ignored by many institutions in this conversation. Starbucks and hotels are not subject to those same laws, so we are not comparing apple to apple here, Starbucks or a hotel has an ISP to provide their internet service, however in EDU, we ARE the ISP in most cases. That is the difference, and where the CALEA laws come into play.
Of those schools who have chosen to allow free and "OPEN" hotspot access, how many of you have consulted your legal team? Can anyone give me specific examples of legal cases that exempt us from CALEA to allow open network access, hardwired or WiFi? Is so, many other institutions would re-evaluate our setups. Perhaps some schools simply assume the risk, and are willing to pay the huge expense to modify their networks to allow on the spot, anytime taps of all network and VOIP traffic by the government? I'd also be interesting in hearing of how many schools don't find those taps to be an issue.
On 11/10/2011 6:47 PM, Theresa Rowe wrote:
Charlie McMahon
Vice President of Information Technology
Chief Technology Officer
Tulane University
504-988-8555 (O)
504-256-6688 (C)
Reply-To: EDUCAUSE Listserv <CIO@LISTSERV.EDUCAUSE.EDU>
Date: Thu, 10 Nov 2011 20:19:07 -0500
To: EDUCAUSE Listserv <CIO@LISTSERV.EDUCAUSE.EDU>
Subject: Re: [CIO] Open Wireless Access
However, it seems that the whole CALEA law is being ignored by many institutions in this conversation. Starbucks and hotels are not subject to those same laws, so we are not comparing apple to apple here, Starbucks or a hotel has an ISP to provide their internet service, however in EDU, we ARE the ISP in most cases. That is the difference, and where the CALEA laws come into play.
Of those schools who have chosen to allow free and "OPEN" hotspot access, how many of you have consulted your legal team? Can anyone give me specific examples of legal cases that exempt us from CALEA to allow open network access, hardwired or WiFi? Is so, many other institutions would re-evaluate our setups. Perhaps some schools simply assume the risk, and are willing to pay the huge expense to modify their networks to allow on the spot, anytime taps of all network and VOIP traffic by the government? I'd also be interesting in hearing of how many schools don't find those taps to be an issue.
On 11/10/2011 6:47 PM, Theresa Rowe wrote:
We follow what appears to be the most typical model where all wireless access requires the users to logon to the network, where all faculty, staff and students already have the appropriate logon credentials, and where there is a mechanism in place to create temporary guest accounts as needed. And we certainly strive to have 100% coverage of all the public, indoor areas of all our campuses. I’ve been very happy with this model for all the reasons that have been so eloquently stated by others in this thread.
I’m a user, too, and I’ve been perfectly happy for years to logon to the campus network with my laptop, for example if I take it somewhere on campus to give a presentation. But as a user, I’m finding that having to logon to the network every time I want to connect my iPhone to the campus wireless network to be very off putting. At home, my wireless network is secure and my iPhone remembers the key to connect to my network. But at work, when I use my iPhone to connect to the campus wireless network, I have to interact with the security model at a totally different level. I’m taken to a Web page where I have to enter my username/password every single time I use the iPhone, and it proves much easier just to turn off Wifi on my iPhone at work and use 3G instead. This is obviously not an optimal solution.
So I’m wondering if there might not be a way to enter my username/password into my iPhone a single time and have it logon to the campus network for me automatically the same way the iPhone can remember the encryption key for my home wireless network. Is there an app for that? I was thinking that it might be a little scary for my iPhone to store my username/password, but actually my iPhone already stores my username/password because the iPhone is configured to connect to my campus E-mail. This mobile stuff is really a game changer.
Jerry
----------------------------------------------------------------------------------------
Jerry Bryan • Vice President of Information Services • Pellissippi State • 10915 Hardin Valley Road • P.O. Box 22990 • Knoxville, TN 37933-0990
Voice: 865 539-7127 • Fax: 865 539-7653 • E-mail: jbryan@pstcc.edu
Perhaps I’m missing something but I’m not sure I would agree that open access, even with filtering, is no less secure than the public internet. I understand the idea of trying to reduce DMCA issue risks with filtering and that makes some sense. To me the issue is one of being able to track activity back to an endpoint. At my home my endpoint can be identified by my DSL provider. For a mobile device, the mobile service provider can identify the endpoint. In your model, there is no identification of the endpoint other than the MAC address of the device. I have been involved in enough security investigations, including FBI activities, to know that that would not be sufficient to determine who did what.
This link http://www.wired.com/threatlevel/2011/08/hacking-from-mcdonalds describes an incident where someone used the open access wi-fi at a McDonald’s restaurant to crash the network and server infrastructure of a company. They basically deleted all of their virtual servers. This person was caught because they were dumb enough to use a credit card to make a purchase at the same restaurant during the time the illegal activities were taking place. A smarter criminal would have sat in a parking lot a few hundred yards away and used a directional antenna. This person no doubt had access to various secured and non-anonymous networks but where did they chose to go to do their illegal activity? If you offer open, unauthenticated access to your wi-fi, how are you going to prevent someone from doing the same thing? How will you assist law enforcement with tracking down the criminal when they determine that your network was involved?
--
Ron Parker, Director of Information Technology, Brazosport College
Voice: (979) 230-3480 FAX: (979) 230-3111
http://www.brazosport.edu
This e-mail sent from my non-mobile, 64-bit, quad core, Windows 7 workstation.
I’ve tried a variety of devices (Laptop, ThinkPad Tablet, Atrix, iPad, etc.) on Seton Hall’s network and I typically only have to authenticate once (but I do have to re-enter my credentials every time I change my network password, which at SHU is required every 90 days for employees and every 180 days for students). We use 802.1x in conjunction with AD, and my iPad, for example, has no problem with this; it remembers my AD credentials and even politely reminds me to re-enter them after I change my network password (some older devices aren’t as polite, but they do all seem to work).
In speaking with my network folks yesterday, they reminded me that we do provide an open 802.11g SSID in the residence halls, but they’re careful to contain the open SSID there insofar as possible (they use many AP’s, typically one for each suite, so that the gain and bleed are both fairly low). The issue that solves is that students bring gaming devices, Tivo’s, and the like that do not “play well” with 802.1x and AD (especially older devices), so this gives them a way to connect their gaming devices. Networking tells me that most devices in the residence halls are connecting to the 802.11n SSID via 801.x and AD even though they have an open SSID available there (and that makes sense, because most of the devices are mobile and so are going to have the students credentials stored already). Because the residence halls are closed (students need to swipe in, and their guests need to sign in and show ID), we haven’t had a problem with this - - so far.
I, too, am enjoying the discussion.
Best regards,
Steve
Laws and resources aside, I wonder what we believe our obligation is when we provide access to the internet.
I realize the natural conflict between the role of the our institutions in providing public good vs. security matters, but I think this maybe more of a fundamental question about the benefits and perils of having “anonymous” internet user in today’s society and our role in dealing with that.
Hossein Shahrokhi
CIO, UH-Downtown
From: The EDUCAUSE CIO Constituent Group Listserv [mailto:CIO@LISTSERV.EDUCAUSE.EDU] On Behalf Of Dave Koontz
Sent: Thursday, November 10, 2011 7:19 PM
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Open Wireless Access
Cost is an interesting conversation. As is the whole consumer device debate.
However, it seems that the whole CALEA law is being ignored by many institutions in this conversation. Starbucks and hotels are not subject to those same laws, so we are not comparing apple to apple here, Starbucks or a hotel has an ISP to provide their internet service, however in EDU, we ARE the ISP in most cases. That is the difference, and where the CALEA laws come into play.
Of those schools who have chosen to allow free and "OPEN" hotspot access, how many of you have consulted your legal team? Can anyone give me specific examples of legal cases that exempt us from CALEA to allow open network access, hardwired or WiFi? Is so, many other institutions would re-evaluate our setups. Perhaps some schools simply assume the risk, and are willing to pay the huge expense to modify their networks to allow on the spot, anytime taps of all network and VOIP traffic by the government? I'd also be interesting in hearing of how many schools don't find those taps to be an issue.
On 11/10/2011 6:47 PM, Theresa Rowe wrote:
I completely agree with the idea that the consumer market has changed the expectations. Our campus hasn't caught on to the idea that they need to support wireless like they do restrooms. I tried points like this, emphasizing the need to commit to wireless and the link to mobile services. We can't move services to mobile platforms if we are not committing to wireless. But I'm struggling offering this to paying customers; the commitment isn't there. Sort of like the restaurant with the sign "Restrooms are for paying customers only."
Theresa
One thing I've been struck by is how many of the contributions cite either theoretical considerations, rare but egregious events (McDonald's support for virtual machine deletion) and personal experience. I'm curious whether the adherents of either model (open vs closed) have hard data from their customers about how they value one experience over another. What do the users say, for example, when asked about their wireless experience?
I don't have this data myself, other than anecdotally.
thanks,
Joseph
Joseph Vaughan CIO/Vice-President for Computing and Information Services Harvey Mudd College vaughan@hmc.edu 909 621 8613 free/busy info at http://tinyurl.com/vaughanfreebusy
On 11/10/2011 01:35 PM, Parker, Ron wrote:
At American University (AU) we have taken what we believe to be a balanced approach to wireless access: Balancing security, technical configuration and usability. Below are the major use cases we support.
Technical: AU uses an Aruba distributed wireless controller/thin AP architecture. It is integrated with our Impulse SafeConnect NAC.
General student/staff/faculty/community member access: Customers connect to a wireless “captive portal” one time for configuration. This network drives the customer through a workflow, preparing them to authenticate their computer to the University’s 802.1x WPA2 encrypted wireless network. The captive portal uses the Cloudpath Xpressconnect supplicant on all supported platforms (PC/Mac) and for other platforms provides instructions on how to manually configure their endpoint. After initial configuration of their 802.1x supplicant, customers don't have to re-authenticate every time they want to use the encrypted network - their supplicant does it for them. This also makes it possible to identify and contact the owners or at least the sponsor of wireless endpoints which are infected with malware and/or behaving badly. Non 802.1x mobile endpoints and game consoles may also use the captive portal network to access the internet on a limited basis. Our Network Access Control (NAC) solution profiles these sorts of devices and where appropriate, requires authentication.
When a PC/MAC endpoint is configured, the computer authenticates via 802.1x to our secure network at every session.
Guests in general: Any AU staff or faculty may create, through a simple web application, a visitor account for up to 2 weeks. The name, duration, and phone number of the guest are required. The account is active and ready for use 3-5minutes after creation. Accounts needed for longer than 2 weeks are provisioned a special “contractor/external” account, with a AU sponsor and an expiration/review date. Sponsors are queried at the expiration date to see if the account is still needed, and when the account is generated a notice is displayed reminding the sponsor that the visitor's use must be consistent with AU policy. The web application to generate visitor accounts is accessible via the AU Portal or customers may call the HelpDesk for assistance.
Guest for academic programs/functions: Local support providers around campus may “batch” create accounts for large groups for up to 2 weeks. The name, duration, and phone number of the guest are required.
Guests for Library/specific “public” locations: Bulk guest accounts are created in advance for each day. Guests may request a “visitor” account by going to the lending/information desk and identifying themselves. The visitor account comes on a printed slip of paper, reminding the visitor that their use/access must be consistent with AU policy.
From: "Jack Suess" <jack@UMBC.EDU>
Date: November 10, 2011 3:27:09 PM EST
To: CIO@LISTSERV.EDUCAUSE.EDU
Subject: Re: [CIO] Open Wireless Access
Reply-To: "The EDUCAUSE CIO Constituent Group Listserv" <CIO@LISTSERV.EDUCAUSE.EDU>
We have had open visitor since the iphone 1 came out. This is on a VLAN that takes you outside the campus firewall and is behind an IPS that will block P2P. While this was for visitors it was heavily used by campus people because our campus wifi uses captive portal that made you login, a pain on smart phones.
We just rolled out EDUROAM ( http://EDUROAM.org/ ) and that supports 802.1x and we are planning to use that for people on campus so we get auto-login of devices and WPA2 support for security. I use this on my iphone and ipad and it works great. In addition, this allows colleagues from other institutions on EDUROAM to auto login to the wireless using their own institutional credentials.
Regarding CALEA, in discussing things with our legal council, we felt that since wireless does not bleed outside the campus boundaries and the case law on this was not well defined we would err in supporting greater usability and monitor the level of security issues that arose. We have not seen many security issues due to the IPS.
Jack
Jack Suess
UMBC Division of Information Technology (DoIT)